The Python Password-Protected Obfuscator
☆33Jul 7, 2019Updated 6 years ago
Alternatives and similar repositories for Ghostfuscator
Users that are interested in Ghostfuscator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Aug 27, 2025Updated 8 months ago
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- ☆25May 9, 2021Updated 4 years ago
- Essential tool for finding blind injection attacks.☆49Feb 6, 2019Updated 7 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Dec 19, 2018Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- yet another dirbuster☆18Jan 14, 2021Updated 5 years ago
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- Automatic UAC-Bypassing for custom payloads during privilege escalation testing☆97Aug 13, 2022Updated 3 years ago
- Automate SSH communication with firewalls, switches, etc.☆28Mar 29, 2018Updated 8 years ago
- Password Lense: reveal character types in a password☆23Oct 18, 2025Updated 6 months ago
- ☆128May 22, 2023Updated 2 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Mar 21, 2019Updated 7 years ago
- DNS Enumeration with Asynchronicity☆45Oct 30, 2018Updated 7 years ago
- A JavaScript components vulnerability scanner, based on RetireJS☆36Jun 8, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆54Jul 15, 2019Updated 6 years ago
- Obfuscate your Bash Code 🛡️☆105Oct 11, 2024Updated last year
- ArmourBird CSF - Container Security Framework☆44Apr 22, 2022Updated 4 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Apr 8, 2023Updated 3 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆543Apr 14, 2021Updated 5 years ago
- Linux, macOS and Windows Install scripts for cnquery & cnspec☆83Updated this week
- dns rebind tool with custom scripts☆85Apr 5, 2023Updated 3 years ago
- HashCobra Hash Cracking tool.☆123Dec 1, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A Simple PE File Heuristics Scanners☆53Mar 8, 2019Updated 7 years ago
- A simple python reverse shell written just for fun.☆62Feb 6, 2023Updated 3 years ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆37Sep 30, 2019Updated 6 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Dec 17, 2020Updated 5 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- Get clients and access points.☆49Aug 28, 2019Updated 6 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 8 years ago
- SDK-SMS-Stack☆28Jan 4, 2023Updated 3 years ago
- Obfuscates a Python Script and the accompanying Shellcode.☆55Dec 30, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Framework for exploiting local vulnerabilities☆83Nov 18, 2023Updated 2 years ago
- A standalone addon for GnuPG☆17Nov 25, 2018Updated 7 years ago
- ☆29Jul 4, 2020Updated 5 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆90May 8, 2018Updated 7 years ago
- Linux Privilege Escalation Tool☆186Apr 12, 2019Updated 7 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆37Feb 11, 2020Updated 6 years ago
- Subdomain Scan With Ping Method.☆46Dec 12, 2020Updated 5 years ago